free css templates

2nd Gen AMD EPYC™ are a new breed of server processors which sets a higher standard for datacenters. Groundbreaking design makes AMD EPYC™ #1 in performance across industry standard benchmarks1. Performance you can count on to propel your modern datacenter workloads. ’Hardened at the Core’ protection helps defend against side-channel attacks and EPYC's secure encrypted virtualization features help keep your data safe. The processor’s agility helps you manage new deployments and changing workloads, with the system resources you need, simply and cost-effectively. AMD is the server processor company can count on for innovation and leadership today and into the future.

Performance Leadership

Virtually everything runs better on AMD EPYC™ 7002 Series powered servers. Whether you run enterprise applications, virtualized and cloud computing environments, software-defined infrastructure, high-performance computing, or data analytic applications. EPYC™ processor-based systems are #1 on industry benchmarks, including those measuring integer, floating-point, virtualisation, database, and HPC performance1. AMD EPYC™ 7742 processor has set new world records that establish AMD as THE performance leader.

The secret is under the hood

AMD Infinity Architecture is a hybrid multi-die architecture that is reaching new heights with AMD EPYC™ 7002 Series processors. AMD Infinity Architecture now decouples two streams: eight dies for the processor cores, and one I/O die that supports security and communication outside the processor. With the agility to deliver the leading-edge process technology for CPU cores while letting I/O circuitry develop at its own rate, new capabilities can be brought to market faster with EPYC™ because its die design is not monolithic. This has allowed EPYC™ to race to leadership in the market and continue to innovate in the future.

Forged from the finest silicon

AMD is first to market an x86 processor based on 7nm technology. With double the core density and optimizations that improve instructions per cycle, the result is 4x the Floating-Point performance3 of 1st Gen AMD EPYC™.
7nm process technology also brings energy efficiency. 2nd Gen AMD EPYC™ can provide the same performance at half the power consumption4.

EPYC™ by the numbers

AMD EPYC™ has been engineered for datacenters that rely on CPU performance. From oil and gas exploration, to in-memory databases, to big data analytics to production rendering to standard datacenter applications, highly parallel workloads have more cores to work with. AMD EPYC™ 7002 generation processors scale from 8 to 64 cores (16 to 128 threads per socket). No other x86 vendor today enables such a core density in the market5.

128 threads | 2.25GHz base | 3.4GHz boost | 256MB cache        

96 threads | 2.4GHz base | 3.4GHz boost | 192MB cache        

64 threads | 2.9GHz base | 3.4GHz boost | 128MB cache        

48 threads | 2.8GHz base | 3.35GHz boost | 128MB cache        

32 threads | 3.0GHz base | 3.3GHz boost | 128MB cache

24 threads | 2.6GHz base | 3.2GHz boost | 64MB cache

16 threads | 3.2GHz base | 3.4GHz boost | 128MB cache

96 threads | 2.4GHz base | 3.4GHz boost | 192MB cache

Enabling software boot without corruption

The AMD EPYC™ processor secure root of trust is designed to validate the initial BIOS software boot without corruption. In virtualized environments, you can cryptographically check that your entire software stack is booted without corruption on a cloud server or services you choose.

Restrict Internal Vulnerabilities

With encrypted memory, attacks on the integrity of main memory (such as cold-boot attacks) are inhibited because any data obtained is encrypted. High-performance encryption engines integrated into the memory controllers help speed performance. All of this is accomplished without modifications to your application software.

Safeguarding Virtual and Cloud Infrastructure

2nd Gen EPYC™ helps safeguard privacy and integrity by encrypting each virtual machine with one of up to 509 unique encryption keys known only to the processor. This aids in protecting confidentiality of your data even if a malicious virtual machine finds a way into your virtual machine’s memory, or a compromised hypervisor reaches into a guest virtual machine.